Fri.Nov 13, 2020

article thumbnail

New Zealand Election Fraud

Schneier on Security

It seems that this election season has not gone without fraud. In New Zealand, a vote for “Bird of the Year” has been marred by fraudulent votes : More than 1,500 fraudulent votes were cast in the early hours of Monday in the country’s annual bird election, briefly pushing the Little-Spotted Kiwi to the top of the leaderboard, organizers and environmental organization Forest & Bird announced Tuesday.

304
304
article thumbnail

Weekly Update 217

Troy Hunt

This week's update had a load of questions so even whilst the planned content didn't consume a lot of time, audience engagement was great and I appreciate all the input. The big excitement for me was that Ubiquiti doorbell and whilst that might seem like a small thing, I'm absolutely loving it and the ability to answer it from anywhere whilst also integrating it into Home Assistant and triggering events like Sonos text to speech is really cool.

Scams 286
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inrupt’s Solid Announcement

Schneier on Security

Earlier this year, I announced that I had joined Inrupt , the company commercializing Tim Berners-Lee’s Solid specification : The idea behind Solid is both simple and extraordinarily powerful. Your data lives in a pod that is controlled by you. Data generated by your things — your computer, your phone, your IoT whatever — is written to your pod.

Insurance 287
article thumbnail

4 phishing scams to watch out for during the holidays

Tech Republic Security

Fake shipping notices and charity frauds are two scams cited by the security company GreatHorn, which offers tips to consumers on how to avoid them.

Scams 218
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

The Scammer Who Wanted to Save His Country

WIRED Threat Level

Last fall, a hacker gave Glenn Greenwald a trove of damning messages between Brazil’s leaders. Some suspected the Russians. The truth was far less boring.

Hacking 144
article thumbnail

6 training trends to watch that "will define the workplace in 2021"

Tech Republic Security

With the shift to remote work amid the coronavirus pandemic, online learning related to mindfulness, cybersecurity, and hybrid tech capabilities surged, Udemy found.

More Trending

article thumbnail

STEM and cybersecurity training are critical for the future

Tech Republic Security

Training people to fill cybersecurity jobs is important, but teaching everyone safe practices is also essential.

article thumbnail

Vertafore data breach exposed data of 27.7 million Texas drivers

Security Affairs

Vertafore announced that information of 27.7 million Texas drivers has been exposed in a data breach caused by a human error. Vertafore announced that information of 27.7 million Texas drivers has been accidentally exposed due to a human error. The company disclosed this security breach this week, data was stored on an unsecured external storage service and they were accessed by an external party.

article thumbnail

How to temporarily mitigate SAD DNS for Linux servers and desktops

Tech Republic Security

Jack Wallen walks you through the process of putting in place a temporary fix against SAD DNS for your Linux servers and desktops.

DNS 152
article thumbnail

Credential-Stuffing Attack Hits The North Face

Threatpost

The North Face has reset an undisclosed number of customer accounts after detecting a credential-stuffing attack on its website.

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Adults and children should learn cybersecurity and safety practices

Tech Republic Security

STEM education that includes cybersecurity can help the US prepare for the future.

article thumbnail

Three APT groups have targeted at least seven COVID-19 vaccine makers

Security Affairs

At least the three nation-state actors have targeted seven COVID-19 vaccine makers, they are Strontium, Lazarus Group, and Cerium, Microsoft warns. Microsoft revealed that at least three APT groups have targeted seven companies involved in COVID-19 vaccines research and treatments. “In recent months, we’ve detected cyberattacks from three nation-state actors targeting seven prominent companies directly involved in researching vaccines and treatments for Covid-19.” reads the post publ

article thumbnail

Three COVID-19 Vaccine-Makers are Under Active Attack

Threatpost

Three major APTs are involved in ongoing compromises at pharma and clinical organizations involved in COVID-19 research, Microsoft says.

article thumbnail

New TroubleGrabber malware targets Discord users

Security Affairs

TroubleGrabber is a recently discovered credential stealer that spreads via Discord attachments and uses Discord webhooks to exfiltrate data. Netskope security researchers have spotted a new credential stealer dubbed TroubleGrabber that spreads via Discord attachments and uses Discord webhooks to transfer stolen data to its operators. The malware the same functionalities used by other malware that target Discord gamers, like AnarchyGrabber , but it appears to be the work of different threat acto

Malware 99
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

CISA Director Expects to Be Fired Following Secure Election

Dark Reading

Meanwhile, key legislators and former DHS officials are speaking out in support of CISA director Chris Krebs, who has led the agency's efforts in election security.

109
109
article thumbnail

Security flaws in Schneider Electric PLCs allow full take over

Security Affairs

Schneider Electric released advisories for multiple flaws, including issues that can allow taking control of Modicon M221 PLCs. Schneider Electric released security advisories for multiple vulnerabilities impacting various products, including four issues that can be exploited by attackers to take control of Modicon M221 programmable logic controllers (PLCs).

article thumbnail

Botnet Attackers Turn to Vulnerable IoT Devices

Threatpost

Cybercriminals are leveraging the multitudes of vulnerable connected devices with botnets that launch dangerous distributed denial-of-service (DDoS) attacks.

IoT 101
article thumbnail

The iOS Covid App Ecosystem Has Become a Privacy Minefield

WIRED Threat Level

An analysis of nearly 500 Covid-related apps worldwide shows major differences in how much data they expect you to give up.

105
105
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Hacker stole $2 million worth of Dai cryptocurrency from Akropolis

Security Affairs

Threat actors have stolen $2 million worth of Dai cryptocurrency from the cryptocurrency borrowing and lending service Akropolis. Cryptocurrency borrowing and lending service Akropolis disclosed a “flash loan” attack, hackers have stolen roughly $2 million worth of Dai cryptocurrency. The attack took place on November 12, in response to the attack the platform halted all the transactions to prevent hackers from stealing further funds.

article thumbnail

Amazon Sues Instagram, TikTok Influencers Over Knockoff Scam

Threatpost

'Order This, Get This': Social-media influencers are in Amazon’s legal crosshairs for promoting generic Amazon listings with the promise to get prohibited counterfeit luxury items instead.

Scams 79
article thumbnail

A Hacker's Holiday: How Retailers Can Avoid Black Friday Cyber Threats

Dark Reading

Starting on Nov. 27, online retailers of all sizes will find out if their e-commerce capabilities are ready for prime time or not.

Retail 96
article thumbnail

Ticketmaster Scores Hefty Fine Over 2018 Data Breach

Threatpost

The events giant faces a GDPR-related penalty in the U.K., and more could follow.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Self-Service Security for Developers Is the DevSecOps Brass Ring

Dark Reading

DevOps teams with full security integration and self-service capabilities are 80% more likely to fix critical vulnerabilities in under a day, according to the ninth annual "State of DevOps Report.

78
article thumbnail

Announcing our open source security key test suite

Google Security

Posted by Fabian Kaczmarczyck, Software Engineer, Jean-Michel Picod, Software Engineer and Elie Bursztein, Security and Anti-abuse Research Lead Security keys and your phone’s built-in security keys are reshaping the way users authenticate online. These technologies are trusted by a growing number of websites to provide phishing-resistant two-factor authentication (2FA).

article thumbnail

The Sameness of Every Day: How to Change Up Audit Fatigue

Dark Reading

And with more data compliance laws on the way, audit fatigue could be a real challenge for infosec professionals.

InfoSec 98
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

You’ve probably heard of bug bounties. But did you know there’s an elite group of bug bounty hunters that travel the world? Meet Stok; he’s one of them. In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. Star of his own popular YouTube channel , Stok believes in community and in giving back what he’s learned along the way.

Hacking 40
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Apple Issues Security Updates

Dark Reading

Vulnerabilities found in three most recent versions of macOS.

89
article thumbnail

Friday Squid Blogging: Underwater Robot Uses Squid-Like Propulsion

Schneier on Security

This is neat : By generating powerful streams of water, UCSD’s squid-like robot can swim untethered. The “squidbot” carries its own power source, and has the room to hold more, including a sensor or camera for underwater exploration. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

257
257
article thumbnail

Report: CISA Chief Expects White House to Fire Him

Threatpost

Chris Krebs, the first and current director of the CISA, said his protection of election process drew ire from Trump administration.